SlideShare a Scribd company logo
Introducing the
OWASP Top 10
for Kubernetes
Jimmy Mesta
CTO / Co-Founder, KSOC
@jimmesta
jimmy@ksoc.com
Nothing to see here
Move along
OWASP 🤝
Kubernetes
owasp.org/www-project-kubernetes-top-ten
hp://owasp.org/www-project-kubernetes-secu
rity-testing-guide
cheatsheetseries.owasp.org/cheatsheets/Dock
er_Security_Cheat_Sheet.html
cheatsheetseries.owasp.org/cheatsheets/Kuber
netes_Security_Cheat_Sheet.html
Another Top Ten?
Kubernetes is highly
configurable, mature, and has
no shortage of success in
production. Security blind
spots still exist and are
presenting serious challenges
for security teams at scale.
owasp.org/www-project-kubernetes-top-ten
@jimmesta
UNSECURED K8S CREDENTIALS
CLUSTER PRIVILEGE ESCALATION
OPEN API
Tesla
Shopify
Dero Miner
Abuse of Kubernetes at scale is already here
RECENT K8S ECOSYSTEM CVES
Clusternet
CubeFS
Jenkins plugin Crossplane
NOTABLE BREACHES
RBAC ISSUE MANAGING K8S AT SCALE
OVERLY PERMISSIVE RBAC
UNMASKED VALUES
GOLANG LIBRARIES FOR CONTROL PLANE
LEVERAGING RBAC FOR PERSISTENCE
RBAC Buster
runc
CVE-2024-21626 - Critical Container Breakout
GKE
RBAC Privilege Escalation and Abuse
@jimmesta
K00 | Introduction
K01 | Insecure Workload Configurations
K02 | Supply Chain Vulnerabilities
K03 | Overly Permissive RBAC Configurations
K04 | Lack of Centralized Policy Enforcement
K05 | Inadequate Logging and Monitoring
K06 | Broken Authentication Mechanisms
K07 | Missing Network Segmentation Controls
K08 | Secrets Management Failures
K09 | Misconfigured Cluster Components
K10 | Outdated and Vulnerable Kubernetes Components
@jimmesta
1. Insecure
Workload
Configurations
Bring on the YAML
What’s the problem?
Misconfigurations top the charts when it
comes to security issues. The 2021
Kubernetes Security Survey from Redhat
stated that nearly 60% of respondents
have experienced a misconfiguration
incident in their Kubernetes environments
in the last 12 months.
@jimmesta
How can we prevent it?
@jimmesta
What tools are on oer to help us?
@jimmesta
2. Supply chain
vulnerabilities
How can we prevent it?
@jimmesta
Software Bill of Materials (SBOM)
Image Signing (hps://github.com/sigstore/cosign)
Image Composition
Image Runtime Verification (rad.security/catalog)
Policy enforcement
How can we prevent it?
@jimmesta
3. Overly
permissive RBAC
Configuration
@jimmesta
What is the problem?
Role-Based Access Control enables fine
grained access for users, groups, and
service accounts within Kubernetes. RBAC
can be extremely diicult to scope
appropriately which opens up additional
privileges.
@jimmesta
@jimmesta
@jimmesta
@jimmesta
How can we prevent it?
▦ Reduce direct cluster access by end users when possible
▦ Don’t use Service Account Tokens outside of the cluster
▦ Avoid automatically mounting the default service account token
▦ Audit RBAC included with installed third-party components
▦ Utilize RoleBindings to limit scope of permissions to particular
namespaces vs. cluster-wide RBAC policies
@jimmesta
@jimmesta
How can we prevent it?
4. Lack of
centralised policy
enforcement
@jimmesta
What is the problem?
Distributing and enforcing security
policies across multiple clusters, clouds,
and risk tolerances quickly becomes
unmanageable for security teams. The
inability to detect, remediate, and prevent
misconfigurations from a central location
can leave clusters open to compromise.
@jimmesta
Example aack
scenario
Container breakout
in a single tweet! 🤯
@jimmesta
How can we
prevent it?
@jimmesta
5. Inadequate
logging &
monitoring
@jimmesta
What is the problem?
A Kubernetes Environment has the ability
to generate logs at a variety of levels from
many dierent components. When logs
are not captured, stored, or actively
monitored aackers have the ability to
exploit vulnerabilities while going largely
undetected.
@jimmesta
How can we prevent it?
Start reviewing the Kubernetes audit logs!
Centralised logging (events, containers,
cloud logs, traces etc)
Runtime detection using tools such as falco.org
@jimmesta
6. Broken
authentication
@jimmesta
What is the problem?
Kubernetes supports a number
of authentication mechanisms,
however many these are likely only
suitable for non-production or small
clusters and can introduce
significant security risks.
@jimmesta
What is the problem?
Kubernetes supports a number
of authentication mechanisms,
however many these are likely only
suitable for non-production or small
clusters and can introduce
significant security risks.
@jimmesta
@jimmesta
How can we prevent it?
▦ Avoid using certificates for end-user authentication
▦ Enforce MFA when possible
▦ Don’t use Service Account tokens from outside of the cluster
▦ Authenticate users and external services using short-lived tokens
@jimmesta
7. Missing
network
segmentation
@jimmesta
What is the problem?
A Wordpress pod is compromised on a cluster that has no
network segmentation and the aacker is able to utilize
built in networking utilities such as dig and curl to explore
the network.
They discover an internally accessible API running on port
6379 which is typically Redis. They are able to probe the
Redis microservice which was intended to be internal and
only used by backend APIs using curl.
Data is stolen and modified.
@jimmesta
How can we prevent it?
▦ Native Controls (Multi-Cluster)
▦ Native Controls (NetworkPolicies)
▦ Service Mesh
@jimmesta
@jimmesta
8. Secret
management
failures
@jimmesta
What is the problem?
An aacker compromises a web application running in a
Kubernetes and is able to get a shell. They run the following
command to ensure Kubernetes secrets are mounted:
ls /var/run/secrets/kubernetes.io/serviceaccount
The aacker installs kubectl in the compromised pod which
by default will aempt to use the default service account
located in the above directory. The aacker can then
communicate with the Kubernetes API from the inside
leveraging the default service account’s RBAC access.
@jimmesta
How can we prevent it?
▦ Encrypt secrets at rest
▦ Ensure logging and auditing is in place
▦ Think about leveraging runtime detection
@jimmesta
Useful tools for secrets
@jimmesta
hps://github.com/mozilla/sops
hps://github.com/bitnami-labs/sealed-secrets
hps://github.com/hashicorp/vault-k8s
9. Misconfigured
cluster
components
@jimmesta
What is the problem?
An aacker compromises a web application running in a
Kubernetes and is able to get a shell. They run the following
command to ensure Kubernetes secrets are mounted:
ls /var/run/secrets/kubernetes.io/serviceaccount
The aacker installs kubectl in the compromised pod which
by default will aempt to use the default service account
located in the above directory. The aacker can then
communicate with the Kubernetes API from the inside
leveraging the default service account’s RBAC access.
@jimmesta
What is the problem?
The components the encompass
Kubernetes itself are highly
configurable. The Kubelet running
on each node are an example of a
critical piece of infrastructure that
requires hardening. This is
especially true in “DIY” clusters.
@jimmesta
@jimmesta
@jimmesta
How can we prevent it?
https://github.com/ksoclabs/kbom
10. Outdated/vuln
k8s components
@jimmesta
What is the problem?
@jimmesta
https://ksoc.com/blog/addressing-the-new-kubernetes-cves-in-ingress-nginx
https://ksoc.com/blog/addressing-curl-vulnerabilities-cve-2023-3854-and-cve-2023-38545
Some questions
to ask yourself…
@jimmesta
Are you using hardened base images?
Are your images being scanned before being used?
Are your images running as root?
Are your images running as a consistent user and group?
Do you have a labelling taxonomy for resources in your cluster?
Are you enforcing policies using Admission Control?
Have you audited the RBAC configuration of your cluster?
Do you have a process for regularly upgrading Kubernetes?
Do you have a process for regularly upgrading your third party tooling?
Thanks,
happy to take
questions …
ksoc.com
Jimmy Mesta,
Co-founder & CTO @ KSOC
@jimmesta
jimmy@ksoc.com

More Related Content

PPTX
Kubernetes Security Act Now Before It’s Too Late
PPTX
DevSecOps in a cloudnative world
PDF
The Hacker's Guide to Kubernetes
PPTX
10 tips for Cloud Native Security
PPTX
Kubernetes Security
PPTX
The State of Kubernetes Security
PPTX
Practical Approaches to Cloud Native Security
PPTX
12 Ways Not to get 'Hacked' your Kubernetes Cluster
Kubernetes Security Act Now Before It’s Too Late
DevSecOps in a cloudnative world
The Hacker's Guide to Kubernetes
10 tips for Cloud Native Security
Kubernetes Security
The State of Kubernetes Security
Practical Approaches to Cloud Native Security
12 Ways Not to get 'Hacked' your Kubernetes Cluster

Similar to GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes (20)

PDF
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
PDF
Securing Kubernetes Workloads
PDF
Container Days: Hijack a Kubernetes Cluster - a Walkthrough
PDF
Hijack a Kubernetes Cluster - a Walkthrough
PPTX
K8s security best practices
PDF
ContainerConf 2022: Hijack Kubernetes
PPTX
Hijack a Kubernetes Cluster - a Walkthrough
PDF
Security threats with Kubernetes - Igor Khoroshchenko
PPTX
KubeSecOps
PDF
5 Kubernetes Security Tools You Should Use
PDF
KCD Munich 2022: How to Prevent Your Kubernetes Cluster From Being Hacked
PDF
Attacking and Defending Kubernetes - Nithin Jois
PDF
How to Prevent Your Kubernetes Cluster From Being Hacked
PDF
Securing your Kubernetes cluster_ a step-by-step guide to success !
PPTX
K8s security best practices
PDF
Practical Guide to Securing Kubernetes
PDF
Kubernetes - Security Journey
PDF
The Hacker's Guide to Kubernetes: Reloaded
PDF
Securing your Kubernetes cluster : a step-by-step guide to success! (v2)
PDF
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Securing Kubernetes Workloads
Container Days: Hijack a Kubernetes Cluster - a Walkthrough
Hijack a Kubernetes Cluster - a Walkthrough
K8s security best practices
ContainerConf 2022: Hijack Kubernetes
Hijack a Kubernetes Cluster - a Walkthrough
Security threats with Kubernetes - Igor Khoroshchenko
KubeSecOps
5 Kubernetes Security Tools You Should Use
KCD Munich 2022: How to Prevent Your Kubernetes Cluster From Being Hacked
Attacking and Defending Kubernetes - Nithin Jois
How to Prevent Your Kubernetes Cluster From Being Hacked
Securing your Kubernetes cluster_ a step-by-step guide to success !
K8s security best practices
Practical Guide to Securing Kubernetes
Kubernetes - Security Journey
The Hacker's Guide to Kubernetes: Reloaded
Securing your Kubernetes cluster : a step-by-step guide to success! (v2)
Kubernetes Summit 2019 - Harden Your Kubernetes Cluster
Ad

More from James Anderson (20)

PDF
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
PDF
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
PDF
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
PDF
GDG Cloud Southlake #41: Shay Levi: Beyond the Hype:How Enterprises Are Using AI
PDF
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
PDF
GDG Cloud Southlake #39 Jacek Ostrowski: Platform Engineering Useful Models
PDF
GDG Cloud Southlake #38: Alex Snihovyi: The LastDevOps Way for Code Reviews
PDF
GDG Cloud Southlake #36: Kyle Forster: AI and Modern Workflow Automation: Aut...
PDF
GDG Cloud Southlake #35: Aravind Iyengar: The Role of AI in Cyber Risk Manage...
PDF
Alt. GDG Cloud Southlake #35_ Aravind Iyengar_ The Role of AI in Cyber Risk M...
PDF
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
PDF
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
PDF
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
PDF
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
PDF
GDG Cloud Southlake 31: Santosh Chennuri and Festus Yeboah: Empowering Develo...
PDF
GDG Cloud Southlake 30 Brian Demers Breeding 10x Developers with Developer Pr...
PDF
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
PDF
GDG SLK - Why should devs care about container security.pdf
PDF
GraphQL Insights Deck ( Sabre_GDG - Sept 2023).pdf
PDF
GDG Cloud Southlake #25: Jacek Ostrowski & David Browne: Sabre's Journey to ...
GDG Cloud Southlake #44: Eyal Bukchin: Tightening the Kubernetes Feedback Loo...
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...
GDG Cloud Southlake #42: Suresh Mathew: Autonomous Resource Optimization: How...
GDG Cloud Southlake #41: Shay Levi: Beyond the Hype:How Enterprises Are Using AI
GDG Cloud Southlake #40: Brandon Stokes: How to Build a Great Product
GDG Cloud Southlake #39 Jacek Ostrowski: Platform Engineering Useful Models
GDG Cloud Southlake #38: Alex Snihovyi: The LastDevOps Way for Code Reviews
GDG Cloud Southlake #36: Kyle Forster: AI and Modern Workflow Automation: Aut...
GDG Cloud Southlake #35: Aravind Iyengar: The Role of AI in Cyber Risk Manage...
Alt. GDG Cloud Southlake #35_ Aravind Iyengar_ The Role of AI in Cyber Risk M...
GDG Cloud Southlake #34: Neatsun Ziv: Automating Appsec
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 31: Santosh Chennuri and Festus Yeboah: Empowering Develo...
GDG Cloud Southlake 30 Brian Demers Breeding 10x Developers with Developer Pr...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG SLK - Why should devs care about container security.pdf
GraphQL Insights Deck ( Sabre_GDG - Sept 2023).pdf
GDG Cloud Southlake #25: Jacek Ostrowski & David Browne: Sabre's Journey to ...
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
cuic standard and advanced reporting.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
cuic standard and advanced reporting.pdf

GDG Cloud Southlake 29 Jimmy Mesta OWASP Top 10 for Kubernetes

  • 1. Introducing the OWASP Top 10 for Kubernetes Jimmy Mesta CTO / Co-Founder, KSOC @jimmesta jimmy@ksoc.com
  • 2. Nothing to see here Move along
  • 4. Another Top Ten? Kubernetes is highly configurable, mature, and has no shortage of success in production. Security blind spots still exist and are presenting serious challenges for security teams at scale. owasp.org/www-project-kubernetes-top-ten @jimmesta
  • 5. UNSECURED K8S CREDENTIALS CLUSTER PRIVILEGE ESCALATION OPEN API Tesla Shopify Dero Miner Abuse of Kubernetes at scale is already here RECENT K8S ECOSYSTEM CVES Clusternet CubeFS Jenkins plugin Crossplane NOTABLE BREACHES RBAC ISSUE MANAGING K8S AT SCALE OVERLY PERMISSIVE RBAC UNMASKED VALUES GOLANG LIBRARIES FOR CONTROL PLANE LEVERAGING RBAC FOR PERSISTENCE RBAC Buster runc CVE-2024-21626 - Critical Container Breakout GKE RBAC Privilege Escalation and Abuse
  • 6. @jimmesta K00 | Introduction K01 | Insecure Workload Configurations K02 | Supply Chain Vulnerabilities K03 | Overly Permissive RBAC Configurations K04 | Lack of Centralized Policy Enforcement K05 | Inadequate Logging and Monitoring K06 | Broken Authentication Mechanisms K07 | Missing Network Segmentation Controls K08 | Secrets Management Failures K09 | Misconfigured Cluster Components K10 | Outdated and Vulnerable Kubernetes Components @jimmesta
  • 8. What’s the problem? Misconfigurations top the charts when it comes to security issues. The 2021 Kubernetes Security Survey from Redhat stated that nearly 60% of respondents have experienced a misconfiguration incident in their Kubernetes environments in the last 12 months. @jimmesta
  • 9. How can we prevent it? @jimmesta
  • 10. What tools are on oer to help us? @jimmesta
  • 12. How can we prevent it? @jimmesta Software Bill of Materials (SBOM) Image Signing (hps://github.com/sigstore/cosign) Image Composition Image Runtime Verification (rad.security/catalog) Policy enforcement
  • 13. How can we prevent it? @jimmesta
  • 15. What is the problem? Role-Based Access Control enables fine grained access for users, groups, and service accounts within Kubernetes. RBAC can be extremely diicult to scope appropriately which opens up additional privileges. @jimmesta
  • 19. How can we prevent it? ▦ Reduce direct cluster access by end users when possible ▦ Don’t use Service Account Tokens outside of the cluster ▦ Avoid automatically mounting the default service account token ▦ Audit RBAC included with installed third-party components ▦ Utilize RoleBindings to limit scope of permissions to particular namespaces vs. cluster-wide RBAC policies @jimmesta
  • 20. @jimmesta How can we prevent it?
  • 21. 4. Lack of centralised policy enforcement @jimmesta
  • 22. What is the problem? Distributing and enforcing security policies across multiple clusters, clouds, and risk tolerances quickly becomes unmanageable for security teams. The inability to detect, remediate, and prevent misconfigurations from a central location can leave clusters open to compromise. @jimmesta
  • 23. Example aack scenario Container breakout in a single tweet! 🤯 @jimmesta
  • 24. How can we prevent it? @jimmesta
  • 26. What is the problem? A Kubernetes Environment has the ability to generate logs at a variety of levels from many dierent components. When logs are not captured, stored, or actively monitored aackers have the ability to exploit vulnerabilities while going largely undetected. @jimmesta
  • 27. How can we prevent it? Start reviewing the Kubernetes audit logs! Centralised logging (events, containers, cloud logs, traces etc) Runtime detection using tools such as falco.org @jimmesta
  • 29. What is the problem? Kubernetes supports a number of authentication mechanisms, however many these are likely only suitable for non-production or small clusters and can introduce significant security risks. @jimmesta
  • 30. What is the problem? Kubernetes supports a number of authentication mechanisms, however many these are likely only suitable for non-production or small clusters and can introduce significant security risks. @jimmesta
  • 32. How can we prevent it? ▦ Avoid using certificates for end-user authentication ▦ Enforce MFA when possible ▦ Don’t use Service Account tokens from outside of the cluster ▦ Authenticate users and external services using short-lived tokens @jimmesta
  • 34. What is the problem? A Wordpress pod is compromised on a cluster that has no network segmentation and the aacker is able to utilize built in networking utilities such as dig and curl to explore the network. They discover an internally accessible API running on port 6379 which is typically Redis. They are able to probe the Redis microservice which was intended to be internal and only used by backend APIs using curl. Data is stolen and modified. @jimmesta
  • 35. How can we prevent it? ▦ Native Controls (Multi-Cluster) ▦ Native Controls (NetworkPolicies) ▦ Service Mesh @jimmesta
  • 38. What is the problem? An aacker compromises a web application running in a Kubernetes and is able to get a shell. They run the following command to ensure Kubernetes secrets are mounted: ls /var/run/secrets/kubernetes.io/serviceaccount The aacker installs kubectl in the compromised pod which by default will aempt to use the default service account located in the above directory. The aacker can then communicate with the Kubernetes API from the inside leveraging the default service account’s RBAC access. @jimmesta
  • 39. How can we prevent it? ▦ Encrypt secrets at rest ▦ Ensure logging and auditing is in place ▦ Think about leveraging runtime detection @jimmesta
  • 40. Useful tools for secrets @jimmesta hps://github.com/mozilla/sops hps://github.com/bitnami-labs/sealed-secrets hps://github.com/hashicorp/vault-k8s
  • 42. What is the problem? An aacker compromises a web application running in a Kubernetes and is able to get a shell. They run the following command to ensure Kubernetes secrets are mounted: ls /var/run/secrets/kubernetes.io/serviceaccount The aacker installs kubectl in the compromised pod which by default will aempt to use the default service account located in the above directory. The aacker can then communicate with the Kubernetes API from the inside leveraging the default service account’s RBAC access. @jimmesta
  • 43. What is the problem? The components the encompass Kubernetes itself are highly configurable. The Kubelet running on each node are an example of a critical piece of infrastructure that requires hardening. This is especially true in “DIY” clusters. @jimmesta
  • 45. @jimmesta How can we prevent it? https://github.com/ksoclabs/kbom
  • 47. What is the problem? @jimmesta https://ksoc.com/blog/addressing-the-new-kubernetes-cves-in-ingress-nginx https://ksoc.com/blog/addressing-curl-vulnerabilities-cve-2023-3854-and-cve-2023-38545
  • 48. Some questions to ask yourself… @jimmesta Are you using hardened base images? Are your images being scanned before being used? Are your images running as root? Are your images running as a consistent user and group? Do you have a labelling taxonomy for resources in your cluster? Are you enforcing policies using Admission Control? Have you audited the RBAC configuration of your cluster? Do you have a process for regularly upgrading Kubernetes? Do you have a process for regularly upgrading your third party tooling?
  • 49. Thanks, happy to take questions … ksoc.com Jimmy Mesta, Co-founder & CTO @ KSOC @jimmesta jimmy@ksoc.com